simo Profile
simo

@_simo36

Followers
7K
Following
921
Media
6
Statuses
36

Joined December 2013
Don't wanna be here? Send us removal request.
@_simo36
simo
1 year
I've audited the Android kernel in late 2023, and reported 10+ kernel bugs to Google, along with 2 exploits. Today, I'm releasing the first exploit, targeting the Mali GPU on Pixel devices, accessible from an untrusted_app context.
26
263
1K
@_simo36
simo
3 years
Tweet media one
36
38
370
@_simo36
simo
3 years
I'm sharing two other iOS kernel vulnerabilities reachable from the default app sandbox that don’t require you to open a UserClient: .
16
119
472
@_simo36
simo
3 years
CVE-2022-32932 is another vulnerability I discovered in the ANE kernel interface; this is a double fetch issue that resulted in an interesting OOB write.
9
69
273
@_simo36
simo
3 years
My #POC2022 slides + the iOS kernel r/w exploit can be found here :) .Thanks @POC_Crew for a fantastic conference and truly honored to have been part of it.
24
199
606
@_simo36
simo
3 years
+16 kernel bugs I reported to Apple have been fixed in iOS 16/16.1. I'll give a talk on how I chained some bugs to achieve kernel r/w at #POC2022 next month, and the kernel exploit for iOS 15 will be released along with a some other high impact vulns after the conference.
31
145
765
@_simo36
simo
3 years
My favorite IDA 8.0 feature so far: artificial Obj-C method imports
Tweet media one
4
3
30
@_simo36
simo
3 years
Tweet media one
35
83
581
@_simo36
simo
3 years
In iOS 15.5 beta 3, Apple removed IOMallocAligned(KHEAP_DEFAULT,. ) from IOSharedDataQueue/IODataQueue::initWithCapacity() ( now uses kernel_memory_allocate() with KMA_DATA flag). It was an elegant technique to groom the kernel default heap with user controlled data. RIP.
8
38
280
@_simo36
simo
3 years
And if you lean more toward IDA, you can also import the C header from Ghidra and parse it there :-)
Tweet media one
0
1
16
@_simo36
simo
3 years
I’ve updated ghidra_kernelcache! now it’s compatible with Ghidra 10.1+, macOS KEXT/Kernelcache support, PAC Xrefs, better class definition with custom class construction feature, dwarf4 and more . check it out.
2
27
129
@_simo36
simo
4 years
Looks like Ghidra does not support LC_DYLD_CHAINED_FIXUPS for macOS M1 KEXTs, here is a dirty script to fix it .
1
4
23
@_simo36
simo
5 years
I've updated oob_events exploit and it should work fine in on A12+ devices (with 60 % of success rate) and ~95% in devices with lower ram size i.e A10. Tested on iPhone 11 and iPhone 7.
19
18
150
@_simo36
simo
5 years
The exploit in arm64e is not quite reliable unlike iPhone 9,3 (which works 9/10 times), expect a lot of kernel panics, it needs some work and it’s hard to make such exploit generic and working across all devices.
3
10
50
@_simo36
simo
5 years
I dont recommend using it in your personal device or to use it for a jailbreak. it may leave your device in unstable state. You’ve been warned.
3
4
54
@_simo36
simo
5 years
Here is a PoC kernel exploit, it demonstrates how to get kernel task port on iOS 13.7. I will update the PoC with a writeup later.
27
120
462
@_simo36
simo
5 years
I've checked iOS 14.1 shipped with IOGPU Family (the successor of IOAcceleratorFamily) and didn't find a matching pattern to trigger the bug, so it works only on iOS 13.x and all devices using IOAcceleratorFamily i.e: macOS.
5
8
36
@_simo36
simo
5 years
PoC for iOS kernel bug reachable from within the sandbox, I may drop the exploit later .
18
163
526
@_simo36
simo
5 years
ghidra_kernelcache: a Ghidra iOS kernelcache framework for reverse engineering.
6
34
136
@_simo36
simo
5 years
iOS 13.6 forced me to rewrite the exploit from scratch.
9
8
100